7 (more) security TED Talks you can’t miss
(Insider Story) Continue reading 7 (more) security TED Talks you can’t miss
Collaborate Disseminate
(Insider Story) Continue reading 7 (more) security TED Talks you can’t miss
There’s been considerable talk in recent years about the importance of cybersecurity information sharing. After all, few organizations can really work in a vacuum and no single organization can see all of the threats laying in wait on the internet.
And many CISOs find it helpful to share notes with others in their industry to compare which strategies and practices work best and compare program maturity levels. But the nearly two-decade effort to share such information hasn’t been smooth.
Many organizations are wary of sharing sensitive cybersecurity information, especially with governments. Not only can such information jeopardize the security posture of an organization, it can damage customer impressions of a company and even affect stock values.
To read this article in full or to leave a comment, please click here
Continue reading Tackling cybersecurity threat information sharing challenges
There’s been considerable talk in recent years about the importance of cybersecurity information sharing. After all, few organizations can really work in a vacuum and no single organization can see all of the threats laying in wait on the internet.
And many CISOs find it helpful to share notes with others in their industry to compare which strategies and practices work best and compare program maturity levels. But the nearly two-decade effort to share such information hasn’t been smooth.
Many organizations are wary of sharing sensitive cybersecurity information, especially with governments. Not only can such information jeopardize the security posture of an organization, it can damage customer impressions of a company and even affect stock values.
To read this article in full or to leave a comment, please click here
Continue reading Tackling cybersecurity threat information sharing challenges
As enterprises rapidly digitize more business processes with cloud computing, mobile, IoT, and data they are straining their ability to find the security talent they need to secure their systems.
According to the Global State of Information Security Survey (GSISS) 2017 — a worldwide study conducted by PwC, CIO and CSO released this month – skilled cybersecurity professionals are hard to come by — and continue to make enterprise IT security all the more challenging. Many enterprises are attempting to close their skills gap by turning to managed security services. According to the survey, 62 percent of respondents use security service providers to operate and enhance their IT security programs.
To read this article in full or to leave a comment, please click here
Continue reading Enterprises continue to struggle to find cybersecurity talent, survey finds
(Insider Story) Continue reading 7 strategies to avoid CSO burnout
It doesn’t seem that a week goes by without some new device or application being discovered vulnerable – from IoT devices to big enterprise applications, proclaimed Andrew Hay, CISO at DataGravity, during a recent presentation at the MISC security conference.
In his talk, MISC 2016: Bootstrapping A Security Research Project, Hay said that anyone can perform security research – and it’s often not the technical details of the research itself that is the challenge for would-be researchers. It’s deciding on what to research and how to get going on that work, and knowing when it’s complete.
To read this article in full or to leave a comment, please click here